Informatics Analysis of Post-Quantum Cryptography Use in Practice